Security & Ethical Hacking: Attacking Unix and Windows
Instructor: Ahmed M. Hamza
What you'll learn
Skills you'll gain
There are 5 modules in this course
A basic review of relevant x86 Assembly language constructs will be given. Students will utilize scripting and low-level programming and other technical means to execute a variety of attacks in adversarial recon, lateral movement, privilege escalation, and authentication bypass on Unix systems, as well as active exploitation of remote memory corruption attacks on multiple OS. An introduction to general computer memory is given, along with other topics in operating systems, as needed. An understanding of C/C++ compiled program languages, code debugging, python programming, and basic computer architecture is required. Experience with Assembly Language programming (Intel) and UNIX command-line (scripting) is preferred. The course is geared towards students in Computer Science, Computer Engineering, and similar domains – but those with sufficient hours of experience in the topics mentioned will be able to follow the material. This course can be taken for academic credit as part of CU Boulder’s Masters of Science in Computer Science (MS-CS) degrees offered on the Coursera platform. This fully accredited graduate degree offer targeted courses, short 8-week sessions, and pay-as-you-go tuition. Admission is based on performance in three preliminary courses, not academic history. CU degrees on Coursera are ideal for recent graduates or working professionals. Learn more: MS in Computer Science: https://coursera.org/degrees/ms-computer-science-boulder
Abusing the Unix Security Model - Privilege Escalation
Evasive Privilege Escalation on Linux
Lateral Movement Techniques on Unix
Memory Corruption and User-Mode Exploitation on MSFT Windows
Explore more from Computer Security and Networks
©2025 ementorhub.com. All rights reserved